New Search

IE File Execution User-prompt Bypass Vulnerability

oval:org.mitre.oval:def:921

Internet Explorer 6.0 allows remote attackers to execute arbitrary code by modifying the Content-Disposition and Content-Type header fields in a way that causes Internet Explorer to believe that the file is safe to open without prompting the user aka the "File Execution Vulnerability."

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows ME
  • Microsoft Windows 2000
  • Microsoft Windows NT
  • Microsoft Windows XP
  • Microsoft Windows 98
Class:
vulnerability
Reference(s):
  • CVE-2001-0727
Product(s):
  • Microsoft Internet Explorer